Tanya Ignatenko

According to our database1, Tanya Ignatenko authored at least 26 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
On Sequential Bayesian Optimization with Pairwise Comparison.
CoRR, 2021

2018
Dedicated Entropy Measures for Early Assessment of Pregnancy Progression From Single-Channel Electrohysterography.
IEEE Trans. Biomed. Eng., 2018

2017
High-Rate Error Correction Schemes for SRAM-PUFs based on Polar Codes.
CoRR, 2017

Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Private authentication keys based on wearable device EEG recordings.
Proceedings of the 25th European Signal Processing Conference, 2017

2015
Fundamental Limits for Privacy-Preserving Biometric Identification Systems That Support Authentication.
IEEE Trans. Inf. Theory, 2015

Biometrics in claim-based authentication framework.
Proceedings of the 16th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2015

2014
AU2EU: Privacy-Preserving Matching of DNA Sequences.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Privacy-leakage codes for biometric authentication systems.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Privacy Leakage in Binary Biometric Systems: From Gaussian to Binary Data.
Proceedings of the Security and Privacy in Biometrics, 2013

2012
Biometric Security from an Information-Theoretical Perspective.
Found. Trends Commun. Inf. Theory, 2012

Authentication based on secret-key generation.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption.
Proceedings of the Seventh International Conference on Availability, 2012

2010
Information leakage in fuzzy commitment schemes.
IEEE Trans. Inf. Forensics Secur., 2010

Identification and secret-key binding in binary-symmetric template-protected biometric systems.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

Identification and secret-key generation in biometric systems with protected templates.
Proceedings of the Multimedia and Security Workshop, 2010

On information leakage in fuzzy commitment.
Proceedings of the Media Forensics and Security II, 2010

Fundamental limits for biometric identification with a database containing protected templates.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
Biometric systems: privacy and secrecy aspects.
IEEE Trans. Inf. Forensics Secur., 2009

Secret rate - Privacy leakage in biometric systems.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Achieving Secure Fuzzy Commitment Scheme for Optical PUFs.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Privacy leakage in biometric secrecy systems.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
On Privacy in Secure Biometric Authentication Systems.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Reference point detection for improved fingerprint matching.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006


  Loading...